Expert Ethical Hacking And Python
3.6 (143 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,654 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Expert Ethical Hacking And Python to your Wishlist.

Add to Wishlist

Expert Ethical Hacking And Python

Expert Ethical Hacking
3.6 (143 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,654 students enrolled
Created by Vishal Patel
Last updated 12/2016
English
Curiosity Sale
Current price: $10 Original price: $195 Discount: 95% off
30-Day Money-Back Guarantee
Includes:
  • 7 hours on-demand video
  • 1 Article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Footprinting,Scanning,Enumeration,System Hacking,Trojan and Backdoors,Viruses and worms,Denial-of-service,Sniffing,Session Hijacking,Wireless Hacking,Firewall,IDS,Honeypots,Buffer Overflows,Penetration Testing,Cryptography
  • Understand and implement basic Python code
  • Gain a knowledge of basic programming concepts
  • Create and run a real-world Python program
View Curriculum
Requirements
  • Basic IT Skill
Description

White Hat Ethical hacking is testing the IT resources for a good cause and for the betterment of technology. This training will establish your understanding of all the fundamental concepts, processes, and procedures.. You will spend time concentrating on each knowledge area, and studying the tools and techniques, inputs, and outputs associated with each knowledge area.

This course will cover :-

foot printing,

Reconnaissance,

Scanning,

System Hacking,

Password Cracking,

Trojan and viruses,

Backdoors,

Denial of Service attack,

Web Server Hacking,

Cryptography,

Wireless Hacking,

Session Hijacking etc...........

In Introduction to Ethical Hacking, you will be introduced to various concepts on ethical hacking. You will receive an introduction to the basics of Risk Management and Disaster Recovery. As well as an introduction to Penetration Testing.

You will gain a comprehensive understanding of vulnerability assessment and the tools used in this process. What kind of security measures do you take to protect your facilities, equipment, resources, personnel, and property from damage caused by unauthorized access? In this course, Physical Security, these are questions that we will be answering. Footprinting is the gathering of information related to a particular computer and its users and systems.

Reconnaissance is an exploration that is conducted to gain information. Network scanning is the scanning of public or private networks to find out which systems are running, their IP addresses, and which services they are running. In Port Scanning, you will learn how ports can be scanned, how a hacker can break into your network through the ports, and the countermeasures you can take to protect your device or network.

Banner grabbing is a technique used to grab information about computer systems on a network and the services running its open ports. In this course you will be introduced to enumeration and the many different uses it has in computer systems. This course will include demos on the different tools and uses of enumeration. In this course you will be learning the fundamentals of Linux. We will be pairing this course with demos with a more in-depth look into some of the fundamentals and tools of Linux.

Pentesting is an attack on a system in hopes of finding security weaknesses. In the course Configuring Linux for Pentesting, you will be learning the steps to configure Linux for pentesting and tools used for pentesting on a Linux system. Whenever we login to a computer system, we provide information to identify ourselves. We refer to this as authentication. Ensure that you know everything involved in securing a Windows system against attack. During this course you'll get into Windows passwords — how they're created, how they're stored, and different methods used to crack them.

You will take a good look at spyware, the activities it performs, different types of spyware, and the countermeasures needed in order to prevent hackers from utilizing these types of techniques against your company. You will also spend time studying different types of keyloggers. There are three different types of keyloggers that we see used in today's environments: hardware, software, and kernel/driver keyloggers. Covering Tracks will be going over various ways that attackers have at their disposal to cover any tracks that may lead to their unwanted eviction, or worse yet, to an audit trail that would lead directly back to them. Trojans and Backdoors is the course where our software is going to be going undercover.

You will discover what viruses and worms are and how they can infect computers and systems. Sniffers is our course where we take a look at Network Sniffing. Social engineering is the art of extorting employees for information.

Become familiar with the following concepts: denial-of-service, distributed denial-of-service, and how the denial-of-service and distributed denial-of-service attacks take place. In the course Session Hijacking, you will learn details about session hijacking, well-known techniques employed by aggressors, the steps involved in session hijacking, various types of session hijacking, tools for hijacking sessions, ways you can protect yourselves from session hijacking, and how pentesting can be used to identify vulnerabilities. Hacking Web and Application Servers, is a course that will give you a good idea about vulnerabilities and attacks available for web servers and web applications. In our course our course Advanced Exploitation Techniques, you will learn what advanced exploitation techniques are and how you can use them in your penetration testing.

Become White Hat Hacker and Learn Python

Delving into the world of coding can be intimidating. With so many complex languages and implementation possibilities, it's easy to become overwhelmed. By starting off with Python programming, you'll learn a simple, versatile and highly readable code that you can execute on a wide variety of systems quickly and easily.

Master one of the most popular programming languages in the world

  • Understand and implement basic Python code
  • Create and run a real-world Python program
  • Gain a knowledge of basic programming concepts

Learn a simple, streamlined coding language quickly and easily

If you've never written a single line of code or if you're well-versed in multiple program languages, Python Programming for Beginners will enable you to better understand programming concepts.

Widely regarded as one of the most simple and versatile programming languages out there, Python is used for web programming, video game building, microchip testing, desktop apps, and so much more. Used by programmers, developers, designers and everyone in between, it's one of the easiest programming languages to learn, and definitely the best starting point for new coders. This course will not only give you an understanding of the code, but will enable you to create and run real world Python programs too.


Who is the target audience?
  • Anyone want to learn how to hack
  • Programmers
  • People who want to learn programming
  • People who want to create web applications
  • Python developers
Students Who Viewed This Course Also Viewed
Curriculum For This Course
49 Lectures
06:57:03
+
Introduction
2 Lectures 08:05
Welcome
00:00

+
Python World's Most Popular Programming Language
9 Lectures 01:23:22

Lecture2
10:47

Lecture3
09:48

Lecture4
14:58

Lecture5
10:27

Lecture6
08:43

Lecture7
10:13

Lecture8
05:52

Lecture9
06:53
+
White Hat Hacking
38 Lectures 05:25:36
Lecture1
08:05

Lecture2
11:47

Lecture3
05:58


Lecture5
08:59

Lecture6
10:22

Lecture7
09:21

Lecture8
11:17

Lecture9
09:15

Lecture10
12:23

Lecture11
08:50

Lecture12
07:00

Lecture13
06:38

Lecture14
10:13

Lecture15
06:46


Lecture17
09:42

Lecture18
07:25

Lecture19
06:19

Lecture20
12:02

Lecture21
10:18


Lecture23
07:28

Lecture24
06:33

Lecture25
05:59

Lecture26
07:48

Lecture27
07:17

Lecture28
06:24

Lecture29
05:45

Lecture30
09:21

Lecture31
11:06

Lecture32
09:45

Lecture33
09:56

Lecture34
07:06

Lecture35
11:10

Lecture36
07:02

Lecture37
07:01

Lecture38
09:23
About the Instructor
Vishal Patel
4.2 Average rating
315 Reviews
6,555 Students
5 Courses
SystemAdministrator,Ethical Hacker,RedHat Certified Engineer

Hi My name is Vishal Patel. I am CEH,RHCSA,RHCE,Strata,A+,N+,CSCU.I have a 6 years of experience as Technical Trainer.I have given lots of training to IT Professionals,Students in India.I have taken lots of seminars in Schools and Colleges in India.I have given full time dedication to this field.I have a keen interest in the field of hacking and network security and adopted this field as my full-time employment.I enjoys computer Security topics.I like music,movies,playing football,swimming,reading.